Static task
static1
Behavioral task
behavioral1
Sample
800e24351b8661b01e258481cc7c8b09.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
800e24351b8661b01e258481cc7c8b09.exe
Resource
win10v2004-20231215-en
General
-
Target
800e24351b8661b01e258481cc7c8b09
-
Size
46KB
-
MD5
800e24351b8661b01e258481cc7c8b09
-
SHA1
4952d26a0b4df97b8dd0933f9e6a03cfa22c1569
-
SHA256
161f08851b9da4c829bc40fee0b1ba4ce5a2f8cc539fcfd3036e9d90e06245be
-
SHA512
9f4944613e0e166a1da79d370ac2db8f8f2868f0a2095897c67d2f082013e3727fe834c1dee04c47a19f20a350efaacfa238b8ef3c99199de42ef4e1d2784189
-
SSDEEP
768:/JIAarRmBk6TyB7ILPW2quAmlOGGIv20f+nmESpSOyFKxv5YYKtHEcERnebdl:RIEbeILPdquAmEGGIv2wEgZ9xvOrEReZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 800e24351b8661b01e258481cc7c8b09
Files
-
800e24351b8661b01e258481cc7c8b09.exe windows:4 windows x86 arch:x86
fd31c99c2d423d3ca201efcce47f9e62
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
DebugActiveProcess
DebugBreak
DeviceIoControl
ExitProcess
FatalExit
GetCommandLineA
GetCurrentDirectoryA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
CreateFileA
GetThreadContext
GetTickCount
GetVersionExA
IsDebuggerPresent
OutputDebugStringA
ReadFile
ReadProcessMemory
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WriteConsoleA
WriteFile
CopyFileA
GetProcAddress
CloseHandle
wsock32
WSAStartup
WSACleanup
gethostbyname
user32
MessageBoxA
gdi32
SetTextAlign
PolyTextOutA
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE